SlideShare una empresa de Scribd logo
1 de 41
BLUE EYES TECHNOLOGY BY: S.Madhumitha.
Why blue eyes technology? A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality.  For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES:to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc.  It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you
OBJECTIVES: creatingcomputational machines that have perceptual and sensory ability like those of human beings. It uses : (1)non-obtrusive sensing method,  (2)employing most modern video cameras and (3)microphones  to identifies the users actions through the use of imparted sensory abilities .  The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.  Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners.
EMOTION MOUSE
EMOTION MOUSE The diff. ways of getting info could possibly include:      Since  a user is mostly in direct contact with an input device, say a mouse, a mouse is an apt way to gather info
Ekman’s Facial Action Coding System In order to start creating smart computers, the computer must start gaining information about the user SCOPE:to have the computer  adapt to the user in order to create a better working environment where the user is more productive. LOGIC: There is always a correlation between a person’s emotional state and a person’s physiological measurements
So various physiological measurements could be used to distinguish various emotional states.  They are:
Data Analysis: The data corresponding to the various physiological measurements is subjected to 2 analysis:
Overall result of analysis: these four physiological measures are sufficient to determine reliably a person’s specific emotional state. One can take these measurements from the hand. The amount of conductivity of the skin is best taken from the fingers. Changes in the temperature of the finger are reliable for prediction of emotion and by change in movement in the computer mouse.
EXPERIMENTAL DESIGN The diff. instruments used in the measurement of  various physiological measurements are:
THE EXPERIMENT: Participants were asked to sit in front of the computer and hold the temperature and GSR sensors in their left hand hold the mouse with their right hand and wore the chest sensor.  The resting (baseline) measurements were recorded for five minutes and then the participant was instructed to act out one emotion for five minutes.  The emotions consisted of:  				1.anger,  				2.fear,  				3.sadness,  				4.disgust,  				5.happiness and 				6.surprise.
 The only instruction for acting out the emotion was to show the emotion in their facial expressions. The sampling rates of diff. measurements: And now by performing certain calculations with these scores and treating those scores which deviated a lot as missing, 1st analysis is completed.
In order to determine whether the measures of physiology could discriminate among the six different emotions, the data is analyzed with a discriminant function analysis.  Now based on the data the emotion was predicted for the samples which did not deviate much from the mean and two-thirds of the cases were successfully classified.
CLASSIFICATION RESULTS:
ADDITIONAL IMPROVISATION RECOMMENDED: Now that we have proven the method, the next step is to improve the hardware.  Instead of using cumbersome multimeters to gather information about the user, it will be better to use smaller and less intrusive units.  We can use infrared pulse detector which can be placed inside the body of the mouse.  Also, a framework for the user modeling needs to be develop in order to correctly handle all of the information after it has been gathered.
MANUAL AND GAZE INPUT CASCADED (MAGIC) POINTING
What is it? This work explores a new direction in utilizing eye gaze for computer input.  Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input.  But there are many fundamental limitations existing with traditional gaze pointing.For an example, the user has to be aware of the eye movements. But with MAGIC (an improved form of eye gazing),a large portion of the cursor movement is eliminated by warping the cursor to the eye gaze area, which encompasses the target There are two techniques:(1)conservative,(2)liberal.
THE PROs AND CONs: ADVANTAGES:              Reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. DISADVANTAGES:              (1).First, given the one-degree size of the fovea and the subconscious jittery motions that the eyes constantly produce, eye gaze is not precise enough to operate UI widgets such as scrollbars, hyperlinks, and slider handles.               (2). Eye has not evolved to be a control organ. Sometimes its movements are voluntarily controlled while at other times it is driven by external events. With the target selection by dwell time method, considered more natural than selection by blinking, one has to be conscious of where one looks and how long one looks at an object
TARGET ACTIVATION: If one does not look at a target continuously for a set threshold (e.g., 200 ms), the target will not be successfully selected.  On the other hand, if one stares at an object for more than the set threshold, the object will be selected, regardless of the user’s intention.  In some cases there is not an adverse effect to a false target selection.  Other times it can be annoying and counter-productive (such as unintended jumps to a web page).
ACTUAL WORKING: In MAGIC, pointingand selection remains primarily  a manual control task but it is aided by gaze tracking. The key idea is to use gaze to dynamically redefine (warp) the “home” position of the pointing cursor to be at the vicinity of the target, which was presumably what the user was looking at, thereby effectively reducing the cursor movement amplitude needed for target selection.  Once the cursor position had been redefined, the user would need to only make a small movement to, and click on, the target with a regular manual input device
Liberal technique: Here the cursor automatically moves to the point where the user is staring or at least to its vicinity. The liberal approach may appear “pro-active”, since the cursor waits readily in the vicinity of or on every potential target.  The user may also feel that the cursor is over-active when he is merely looking at a target.
Conservative: This technique does not warp a cursor to a target until the manual input device has been actuated.  Once the manual input device has been actuated the cursor is warped to the gaze area reported by the eye tracker. This area should be on or in the vicinity of the target. The user would then steer the cursor annually towards the target to complete the target acquisition.  Once the user looks at a target and moves the input device, the cursor will appear “out of the blue” in motion towards the target,
Potential advantages of MAGIC pointing techniques: Reduction of manual stress and fatigue. Practical accuracy level in comparison to traditional pure gaze pointing.  The user does not have to be aware of the role of the eye gaze. Speed. {Fitts’ Law, manual pointing time is logarithmically proportional to the A/W ratio, where A is the movement distance and W is the target size. In other words, targets which are smaller or farther away take longer to acquire. } Improved subjective speed and ease-of-use.
Changes recommended: The cursor warping can be overactive at times, which could be particularly distracting when the user is trying to read. So,Whenthe user’s eye appears to follow a text reading pattern, MAGIC pointing can be automatically suppressed. conservative MAGIC pointing technique adopts a cumbersome strategy: take a touch, wait , and move. Such a strategy may prolong the target acquisition time. The user has to learn a novel hand-eye coordination pattern to be efficient.  Clearly, experimental (implementation and empirical) work is needed to validate, refine, or invent alternative MAGIC pointing techniques.
THE EYE TRACKER One can purchase the a commercial eye tracker (ASL Model 5000), this system is much more compact and reliable.  It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is  positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image.
Dark and bright images: When the light source is placed on-axis with the camera optical axis, the camera is able to detect the light reflected from the interior of the eye, and the image of the pupil appears bright The Almaden system uses two near infrared (IR) time multiplexed light sources, composed of two sets of IR LED's, which were synchronized with the camera frame rate. Bright(left) and dark(right) images resulting from on and off axis illumination. The glints, or corneal reflections, from the on- and off-axis light sources can be easily identified as the bright points in the iris.
Identification of the pupil: One light source is placed very close to the camera's optical axis and is synchronized with the even frames.  Odd frames are synchronized with the second light source, positioned off axis.  The two light sources are calibrated to provide approximately equivalent whole-scene illumination.  Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image.  After thresholding the difference, the largest connected component is identified as the pupil.  This technique significantly increases the robustness and reliability of the eye tracking system. This is similar pupil detection schemes independently developed by Tomonoetal and Ebisawa and Satoh. But such a method has not been used in the commercial systems.
Implementing MAGIC pointing: The MAGIC pointing program takes data from both the manual input device and the eye tracking system running either on the same machine or on another machine connected via serial port.  Raw data from an eye tracker can not be directly used for gaze-based interaction, due to noise from image processing, eye movement jitters, and samples taken during saccade (ballistic eye movement) periods.
One has to experiment with various filtering techniques. The goal of filter design in general is to make the best compromise between preserving signal bandwidth and eliminating unwanted noise.  Samples collected during a saccade are unwanted and should be avoided.  In designing our algorithm for picking points of fixation, consider our tracking system speed (30 Hz), and that the MAGIC pointing techniques utilize gaze information only once for each new target, probably immediately after a saccade.  Our filtering algorithm was designed to pick a fixation with minimum delay by means of selecting two adjacent points over two samples.
ARTIFICIAL INTELLIGENT SPEECH RECOGNITION
HURDLES OF SPEECH RECOGNITION: It is important to consider the environment in which the speech recognition system has to work:  			(1)The grammar used by the speaker and accepted by the system,  			(2)noise level,  			(3)noise type,  			(4)position of the microphone and  			(5)speed and manner of the user’s speech are some factors that may affect the quality of speech recognition   The best example for speech recognition system : an automatic call-handling system is used without employing any telephone operator.
 THE TECHNOLOGY Two basic ideas: AI makes machines smarter and more useful, and is less expensive than natural intelligence.  Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are scanned and matched against internally stored known words. Identification of a key word causes some action to be taken.
SPEECH RECOGNITION
Search process The search process takes a considerable amount of time, as the CPU has to make many comparisons before recognition occurs.  This necessitates use of very high-speed processors.  A largeRAM is also required as even though a spoken word may last only a few hundred milliseconds, but the same is translated into many thousands of digital words.  It is important to note that alignment of words and templates are to be matched correctly in time, before computing the similarity score.  This process, termed as dynamic time warping, recognizes that different speakers pronounce the same words at different speeds as well as elongate different parts of the same word.
MAJOR APPLICATIONS: Lets user do other works simultaneously: The user can concentrate on observation and manual operations, and still control the machinery by voice input commands. Military operations: Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones—they don’t have to use their hands for this purpose. An Radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system connected to word processors. For making airline and hotel reservations: A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
THE SIMPLE USER INTERST TRACKER (SUITOR)
Why SUITOR? Computers would have been much more powerful, had they gained perceptual and sensory abilities of the living beings on the earth. What needs to be developed is an intimate relationship between the computer and the humans. By observing the Webpage a netizen is browsing, the SUITOR can help by fetching more information at his desktop. By simply noticing where the user’s eyes focus on the computer screen, the SUITOR can be more precise in determining his topic of interest. The success lies in how much the suitor can be intimate to the user
Paul Maglio’S take on SUITOR: SUITOR fills a scrolling ticker on a computer screen with information related to the user's current task.   "If I'm reading a Web page about IBM, for instance," says Paul Maglio, the Almaden cognitive scientist who invented SUITOR, "the system presents the latest stock price or business news stories that could affect IBM. If I read the headline off the ticker, it pops up the story in a browser window. If I start to read the story, it adds related stories to the ticker. That's the whole idea of an attentive system—one that attends to what you are doing, typing, reading, so that it can attend to your information needs."
THE FUTURE FOR BLUE EYES: The nineties witnessed quantum leaps interface designing for improved man machine interactions.  The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices.  Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units.  The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device.  Any way this is only a technological forecast.
But definitely BLUE EYES TECHNOLOGY is the future. After all who would not want to own a computer that    (1)can easily adapt to your mood,    (2)perform tasks the moment you “actually tell” it what you want    (3)help you by gathering more additional information    (4)saves you the job of having to move your cursor to a long distance    (5)with further additions, can even help to monitor your health.
THANK YOU

Más contenido relacionado

La actualidad más candente

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eyeanju ann
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete pptatinav242
 
Blue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationBlue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationVaibhav Kumar
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGYChaitanya Ram
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar PresentationAparna Nk
 
Blue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEBlue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEUtkarsh Lokpriye
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologylalithyarai
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition TechnologyMuhammad Zeeshan
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognitionAayush Agrawal
 
Blue eyes technology ppt
Blue eyes technology pptBlue eyes technology ppt
Blue eyes technology pptijaranjani
 

La actualidad más candente (20)

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eye
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
Blue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationBlue Eye Technology Seminar Presentation
Blue Eye Technology Seminar Presentation
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Blue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEBlue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYE
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue brain ppt
Blue brain pptBlue brain ppt
Blue brain ppt
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition Technology
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
blue-eyes technology
blue-eyes technologyblue-eyes technology
blue-eyes technology
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognition
 
Blue eyes technology ppt
Blue eyes technology pptBlue eyes technology ppt
Blue eyes technology ppt
 

Similar a Blue Eyes Technology

20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdfYasmin297583
 
Eye tracking – an innovative monitor
Eye tracking – an innovative monitorEye tracking – an innovative monitor
Eye tracking – an innovative monitorSakthi Sivaraman S
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYgeothomas18
 
Master thesis 2
Master thesis 2Master thesis 2
Master thesis 2Jb Soni
 
eye tracking system and formulation
eye tracking system and formulationeye tracking system and formulation
eye tracking system and formulationsavesun
 
Eyetracking
EyetrackingEyetracking
EyetrackingMD Shafe
 
Eye Tracking Interpretation System
Eye Tracking Interpretation SystemEye Tracking Interpretation System
Eye Tracking Interpretation Systemkurkute1994
 
Eye Tracking Software model of left right all
Eye Tracking Software model of left right allEye Tracking Software model of left right all
Eye Tracking Software model of left right allAtharvaTanawade
 
A computer vision based virtual mouse
A computer vision based virtual mouseA computer vision based virtual mouse
A computer vision based virtual mouseStudentRocks
 
ICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses PapersICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses PapersChun-Feng Chen
 
Cursor Movement with Eyeball
Cursor Movement with EyeballCursor Movement with Eyeball
Cursor Movement with EyeballIRJET Journal
 
Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1keerthi k
 
Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Ajith Kumar Ravi
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAijcseit
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAijcseit
 
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
E YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIAE YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIA
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIAijcsit
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAijcseit
 

Similar a Blue Eyes Technology (20)

ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 
20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf
 
Eye tracking – an innovative monitor
Eye tracking – an innovative monitorEye tracking – an innovative monitor
Eye tracking – an innovative monitor
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGY
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 
Master thesis 2
Master thesis 2Master thesis 2
Master thesis 2
 
eye tracking system and formulation
eye tracking system and formulationeye tracking system and formulation
eye tracking system and formulation
 
Eyetracking
EyetrackingEyetracking
Eyetracking
 
Eye Tracking Interpretation System
Eye Tracking Interpretation SystemEye Tracking Interpretation System
Eye Tracking Interpretation System
 
Eye Tracking Software model of left right all
Eye Tracking Software model of left right allEye Tracking Software model of left right all
Eye Tracking Software model of left right all
 
A computer vision based virtual mouse
A computer vision based virtual mouseA computer vision based virtual mouse
A computer vision based virtual mouse
 
ICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses PapersICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses Papers
 
Cursor Movement with Eyeball
Cursor Movement with EyeballCursor Movement with Eyeball
Cursor Movement with Eyeball
 
Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1
 
Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Blue eyes technology New Version 2017
Blue eyes technology New Version 2017
 
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
E YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIAE YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIA
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 

Más de Colloquium

Blue Eyes Technology Abstract
Blue Eyes Technology AbstractBlue Eyes Technology Abstract
Blue Eyes Technology AbstractColloquium
 
Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)Colloquium
 
Virtualization
VirtualizationVirtualization
VirtualizationColloquium
 
Nanotechnology Abstract
Nanotechnology AbstractNanotechnology Abstract
Nanotechnology AbstractColloquium
 
Vinod Robotics
Vinod RoboticsVinod Robotics
Vinod RoboticsColloquium
 
Nanotechnology
NanotechnologyNanotechnology
NanotechnologyColloquium
 
Ce Ppt Sourabh
Ce Ppt SourabhCe Ppt Sourabh
Ce Ppt SourabhColloquium
 
Wireless Charging
Wireless ChargingWireless Charging
Wireless ChargingColloquium
 
Hybrid Electric Vehicles
Hybrid Electric VehiclesHybrid Electric Vehicles
Hybrid Electric VehiclesColloquium
 
Particle Image Velocimetry
Particle Image VelocimetryParticle Image Velocimetry
Particle Image VelocimetryColloquium
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 
Innovations In Burglar Alarms Ppt
Innovations In Burglar Alarms PptInnovations In Burglar Alarms Ppt
Innovations In Burglar Alarms PptColloquium
 
Nanotechnology In Civil Engineering
Nanotechnology   In Civil   EngineeringNanotechnology   In Civil   Engineering
Nanotechnology In Civil EngineeringColloquium
 

Más de Colloquium (20)

Blue Eyes Technology Abstract
Blue Eyes Technology AbstractBlue Eyes Technology Abstract
Blue Eyes Technology Abstract
 
Final Nano
Final NanoFinal Nano
Final Nano
 
Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Nanotechnology Abstract
Nanotechnology AbstractNanotechnology Abstract
Nanotechnology Abstract
 
Vinod Robotics
Vinod RoboticsVinod Robotics
Vinod Robotics
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Ce Ppt Sourabh
Ce Ppt SourabhCe Ppt Sourabh
Ce Ppt Sourabh
 
Remote
RemoteRemote
Remote
 
Nanotech.
Nanotech.Nanotech.
Nanotech.
 
E Business
E BusinessE Business
E Business
 
Wireless Charging
Wireless ChargingWireless Charging
Wireless Charging
 
Cryogenics
CryogenicsCryogenics
Cryogenics
 
Hybrid Electric Vehicles
Hybrid Electric VehiclesHybrid Electric Vehicles
Hybrid Electric Vehicles
 
Erp1
Erp1Erp1
Erp1
 
Particle Image Velocimetry
Particle Image VelocimetryParticle Image Velocimetry
Particle Image Velocimetry
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
Man Sew
Man SewMan Sew
Man Sew
 
Innovations In Burglar Alarms Ppt
Innovations In Burglar Alarms PptInnovations In Burglar Alarms Ppt
Innovations In Burglar Alarms Ppt
 
Nanotechnology In Civil Engineering
Nanotechnology   In Civil   EngineeringNanotechnology   In Civil   Engineering
Nanotechnology In Civil Engineering
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Blue Eyes Technology

  • 1. BLUE EYES TECHNOLOGY BY: S.Madhumitha.
  • 2. Why blue eyes technology? A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality. For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES:to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you
  • 3. OBJECTIVES: creatingcomputational machines that have perceptual and sensory ability like those of human beings. It uses : (1)non-obtrusive sensing method, (2)employing most modern video cameras and (3)microphones to identifies the users actions through the use of imparted sensory abilities . The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners.
  • 5. EMOTION MOUSE The diff. ways of getting info could possibly include: Since a user is mostly in direct contact with an input device, say a mouse, a mouse is an apt way to gather info
  • 6. Ekman’s Facial Action Coding System In order to start creating smart computers, the computer must start gaining information about the user SCOPE:to have the computer adapt to the user in order to create a better working environment where the user is more productive. LOGIC: There is always a correlation between a person’s emotional state and a person’s physiological measurements
  • 7. So various physiological measurements could be used to distinguish various emotional states.  They are:
  • 8. Data Analysis: The data corresponding to the various physiological measurements is subjected to 2 analysis:
  • 9. Overall result of analysis: these four physiological measures are sufficient to determine reliably a person’s specific emotional state. One can take these measurements from the hand. The amount of conductivity of the skin is best taken from the fingers. Changes in the temperature of the finger are reliable for prediction of emotion and by change in movement in the computer mouse.
  • 10. EXPERIMENTAL DESIGN The diff. instruments used in the measurement of various physiological measurements are:
  • 11. THE EXPERIMENT: Participants were asked to sit in front of the computer and hold the temperature and GSR sensors in their left hand hold the mouse with their right hand and wore the chest sensor. The resting (baseline) measurements were recorded for five minutes and then the participant was instructed to act out one emotion for five minutes. The emotions consisted of: 1.anger, 2.fear, 3.sadness, 4.disgust, 5.happiness and 6.surprise.
  • 12. The only instruction for acting out the emotion was to show the emotion in their facial expressions. The sampling rates of diff. measurements: And now by performing certain calculations with these scores and treating those scores which deviated a lot as missing, 1st analysis is completed.
  • 13. In order to determine whether the measures of physiology could discriminate among the six different emotions, the data is analyzed with a discriminant function analysis. Now based on the data the emotion was predicted for the samples which did not deviate much from the mean and two-thirds of the cases were successfully classified.
  • 15. ADDITIONAL IMPROVISATION RECOMMENDED: Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome multimeters to gather information about the user, it will be better to use smaller and less intrusive units. We can use infrared pulse detector which can be placed inside the body of the mouse. Also, a framework for the user modeling needs to be develop in order to correctly handle all of the information after it has been gathered.
  • 16. MANUAL AND GAZE INPUT CASCADED (MAGIC) POINTING
  • 17. What is it? This work explores a new direction in utilizing eye gaze for computer input. Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input. But there are many fundamental limitations existing with traditional gaze pointing.For an example, the user has to be aware of the eye movements. But with MAGIC (an improved form of eye gazing),a large portion of the cursor movement is eliminated by warping the cursor to the eye gaze area, which encompasses the target There are two techniques:(1)conservative,(2)liberal.
  • 18. THE PROs AND CONs: ADVANTAGES: Reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. DISADVANTAGES: (1).First, given the one-degree size of the fovea and the subconscious jittery motions that the eyes constantly produce, eye gaze is not precise enough to operate UI widgets such as scrollbars, hyperlinks, and slider handles. (2). Eye has not evolved to be a control organ. Sometimes its movements are voluntarily controlled while at other times it is driven by external events. With the target selection by dwell time method, considered more natural than selection by blinking, one has to be conscious of where one looks and how long one looks at an object
  • 19. TARGET ACTIVATION: If one does not look at a target continuously for a set threshold (e.g., 200 ms), the target will not be successfully selected. On the other hand, if one stares at an object for more than the set threshold, the object will be selected, regardless of the user’s intention. In some cases there is not an adverse effect to a false target selection. Other times it can be annoying and counter-productive (such as unintended jumps to a web page).
  • 20. ACTUAL WORKING: In MAGIC, pointingand selection remains primarily a manual control task but it is aided by gaze tracking. The key idea is to use gaze to dynamically redefine (warp) the “home” position of the pointing cursor to be at the vicinity of the target, which was presumably what the user was looking at, thereby effectively reducing the cursor movement amplitude needed for target selection. Once the cursor position had been redefined, the user would need to only make a small movement to, and click on, the target with a regular manual input device
  • 21. Liberal technique: Here the cursor automatically moves to the point where the user is staring or at least to its vicinity. The liberal approach may appear “pro-active”, since the cursor waits readily in the vicinity of or on every potential target. The user may also feel that the cursor is over-active when he is merely looking at a target.
  • 22. Conservative: This technique does not warp a cursor to a target until the manual input device has been actuated. Once the manual input device has been actuated the cursor is warped to the gaze area reported by the eye tracker. This area should be on or in the vicinity of the target. The user would then steer the cursor annually towards the target to complete the target acquisition. Once the user looks at a target and moves the input device, the cursor will appear “out of the blue” in motion towards the target,
  • 23. Potential advantages of MAGIC pointing techniques: Reduction of manual stress and fatigue. Practical accuracy level in comparison to traditional pure gaze pointing. The user does not have to be aware of the role of the eye gaze. Speed. {Fitts’ Law, manual pointing time is logarithmically proportional to the A/W ratio, where A is the movement distance and W is the target size. In other words, targets which are smaller or farther away take longer to acquire. } Improved subjective speed and ease-of-use.
  • 24. Changes recommended: The cursor warping can be overactive at times, which could be particularly distracting when the user is trying to read. So,Whenthe user’s eye appears to follow a text reading pattern, MAGIC pointing can be automatically suppressed. conservative MAGIC pointing technique adopts a cumbersome strategy: take a touch, wait , and move. Such a strategy may prolong the target acquisition time. The user has to learn a novel hand-eye coordination pattern to be efficient. Clearly, experimental (implementation and empirical) work is needed to validate, refine, or invent alternative MAGIC pointing techniques.
  • 25. THE EYE TRACKER One can purchase the a commercial eye tracker (ASL Model 5000), this system is much more compact and reliable. It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image.
  • 26. Dark and bright images: When the light source is placed on-axis with the camera optical axis, the camera is able to detect the light reflected from the interior of the eye, and the image of the pupil appears bright The Almaden system uses two near infrared (IR) time multiplexed light sources, composed of two sets of IR LED's, which were synchronized with the camera frame rate. Bright(left) and dark(right) images resulting from on and off axis illumination. The glints, or corneal reflections, from the on- and off-axis light sources can be easily identified as the bright points in the iris.
  • 27. Identification of the pupil: One light source is placed very close to the camera's optical axis and is synchronized with the even frames. Odd frames are synchronized with the second light source, positioned off axis. The two light sources are calibrated to provide approximately equivalent whole-scene illumination. Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image. After thresholding the difference, the largest connected component is identified as the pupil. This technique significantly increases the robustness and reliability of the eye tracking system. This is similar pupil detection schemes independently developed by Tomonoetal and Ebisawa and Satoh. But such a method has not been used in the commercial systems.
  • 28. Implementing MAGIC pointing: The MAGIC pointing program takes data from both the manual input device and the eye tracking system running either on the same machine or on another machine connected via serial port. Raw data from an eye tracker can not be directly used for gaze-based interaction, due to noise from image processing, eye movement jitters, and samples taken during saccade (ballistic eye movement) periods.
  • 29. One has to experiment with various filtering techniques. The goal of filter design in general is to make the best compromise between preserving signal bandwidth and eliminating unwanted noise. Samples collected during a saccade are unwanted and should be avoided. In designing our algorithm for picking points of fixation, consider our tracking system speed (30 Hz), and that the MAGIC pointing techniques utilize gaze information only once for each new target, probably immediately after a saccade. Our filtering algorithm was designed to pick a fixation with minimum delay by means of selecting two adjacent points over two samples.
  • 31. HURDLES OF SPEECH RECOGNITION: It is important to consider the environment in which the speech recognition system has to work: (1)The grammar used by the speaker and accepted by the system, (2)noise level, (3)noise type, (4)position of the microphone and (5)speed and manner of the user’s speech are some factors that may affect the quality of speech recognition The best example for speech recognition system : an automatic call-handling system is used without employing any telephone operator.
  • 32.  THE TECHNOLOGY Two basic ideas: AI makes machines smarter and more useful, and is less expensive than natural intelligence. Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are scanned and matched against internally stored known words. Identification of a key word causes some action to be taken.
  • 34. Search process The search process takes a considerable amount of time, as the CPU has to make many comparisons before recognition occurs. This necessitates use of very high-speed processors. A largeRAM is also required as even though a spoken word may last only a few hundred milliseconds, but the same is translated into many thousands of digital words. It is important to note that alignment of words and templates are to be matched correctly in time, before computing the similarity score. This process, termed as dynamic time warping, recognizes that different speakers pronounce the same words at different speeds as well as elongate different parts of the same word.
  • 35. MAJOR APPLICATIONS: Lets user do other works simultaneously: The user can concentrate on observation and manual operations, and still control the machinery by voice input commands. Military operations: Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones—they don’t have to use their hands for this purpose. An Radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system connected to word processors. For making airline and hotel reservations: A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
  • 36. THE SIMPLE USER INTERST TRACKER (SUITOR)
  • 37. Why SUITOR? Computers would have been much more powerful, had they gained perceptual and sensory abilities of the living beings on the earth. What needs to be developed is an intimate relationship between the computer and the humans. By observing the Webpage a netizen is browsing, the SUITOR can help by fetching more information at his desktop. By simply noticing where the user’s eyes focus on the computer screen, the SUITOR can be more precise in determining his topic of interest. The success lies in how much the suitor can be intimate to the user
  • 38. Paul Maglio’S take on SUITOR: SUITOR fills a scrolling ticker on a computer screen with information related to the user's current task. "If I'm reading a Web page about IBM, for instance," says Paul Maglio, the Almaden cognitive scientist who invented SUITOR, "the system presents the latest stock price or business news stories that could affect IBM. If I read the headline off the ticker, it pops up the story in a browser window. If I start to read the story, it adds related stories to the ticker. That's the whole idea of an attentive system—one that attends to what you are doing, typing, reading, so that it can attend to your information needs."
  • 39. THE FUTURE FOR BLUE EYES: The nineties witnessed quantum leaps interface designing for improved man machine interactions. The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices. Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units. The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device. Any way this is only a technological forecast.
  • 40. But definitely BLUE EYES TECHNOLOGY is the future. After all who would not want to own a computer that (1)can easily adapt to your mood, (2)perform tasks the moment you “actually tell” it what you want (3)help you by gathering more additional information (4)saves you the job of having to move your cursor to a long distance (5)with further additions, can even help to monitor your health.